Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm aware. My statement still stands.


But the outline of PRISM described there seems to confirm (1) and (2), no? They didn't need a subpoena for each user, had access to a search term firehose, and the legal method for (2) was the secret FISA court.

The access isn't as complete as full arbitrary data, but it's also a long way from only responding to known legal warrants and subpoenas.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: